22
Security marking: Unclassified Page 1 of 22 GMICT Policy ictpolicies.gov.mt Information Security Policy Reference: GMICT P 0016 Publication: 9 December 2019 Version: 6.0 Effective: 9 December 2019 Purpose To enable the Public Administration to uphold information security. It is aligned to ISO 27001:2013 (Information technology - Security techniques - Information security management systems – Requirements). Scope The scope of this Policy includes: ICT devices and storage in use within the Public Administration ICT devices connecting to the Malta Government Network (MAGNET) Systems that maintain and process Government data Auditing of solutions containing and/or transmitting production data Electronic representations of data Classified data carrying a Security Marking of Restricted or Confidential, throughout an ICT Solution’s lifecycle. Definitions Underlined terms are defined in the Vocabulary (GMICT X 0003).

GMICT Policy ictpolicies.gov

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: GMICT Policy ictpolicies.gov

Security marking: Unclassified

Page 1 of 22

GMICT Policy ictpolicies.gov.mt

Information Security Policy Reference: GMICT P 0016 Publication: 9 December 2019

Version: 6.0 Effective: 9 December 2019

Purpose

To enable the Public Administration to uphold information security. It is aligned to ISO

27001:2013 (Information technology - Security techniques - Information security

management systems – Requirements).

Scope

The scope of this Policy includes:

• ICT devices and storage in use within the Public Administration

• ICT devices connecting to the Malta Government Network (MAGNET)

• Systems that maintain and process Government data

• Auditing of solutions containing and/or transmitting production data

• Electronic representations of data

• Classified data carrying a Security Marking of Restricted or Confidential,

throughout an ICT Solution’s lifecycle.

Definitions

Underlined terms are defined in the Vocabulary (GMICT X 0003).

Page 2: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 2 of 22

Contents Purpose ......................................................................................................................................1 Scope .........................................................................................................................................1 Definitions ..................................................................................................................................1 General ......................................................................................................................................3 Organisation of Information Security .....................................................................................3 Security Marking of Data .........................................................................................................4 Physical and Environmental Security .....................................................................................4 Asset Management .................................................................................................................5 Access Control .........................................................................................................................5 Account Management ...........................................................................................................7 Passwords ..................................................................................................................................8 Protection of Production Data ...............................................................................................9 Cryptographic Controls .........................................................................................................10 Operational Procedures and Responsibilities .....................................................................10 Protection from Malware ......................................................................................................10

E-mail and Internet .............................................................................................................11 Technical Vulnerability Management .................................................................................11 Connecting to MAGNET ........................................................................................................11 Servers ......................................................................................................................................12 Backup .....................................................................................................................................13 Clock Synchronisation ...........................................................................................................14 Audit Data ...............................................................................................................................14 System Acquisition, Development and Maintenance ......................................................15 Information Security incident management ......................................................................15 Business Continuity Management ........................................................................................15 Information Security Reviews ................................................................................................15 Intellectual Property Rights ....................................................................................................16 Acceptable Use .....................................................................................................................16 Appendix 1: Security Marking List .........................................................................................18

Security Marking ..............................................................................................................18 Description .......................................................................................................................18 Preparation and handling .............................................................................................18 Access ..............................................................................................................................18 Copying and Storage .....................................................................................................18 Exchange .........................................................................................................................18 Archive or disposal ..........................................................................................................18

Deviations from GMICT Policy ...............................................................................................22 Issuing Authority ......................................................................................................................22 Contact Information ..............................................................................................................22

Page 3: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 3 of 22

General

1. Confidentiality, Integrity and Availability shall be the underlying security principles

throughout a lifecycle of any Solution that handles Government data.

2. It is the responsibility of all relevant stakeholders to maintain Government

information security and contribute to it.

3. All relevant stakeholders shall be committed towards the continual improvement

of information security.

4. Management shall facilitate training and awareness of Information Security and

shall ensure that all relevant stakeholders (including contractors) under their

responsibility abide by the relevant security policies and procedures.

5. Management shall ensure that sufficient Information Security resources are made

available.

6. Information Security is a shared responsibility. Stakeholders of a System shall be

responsible for the Information Security of their respective artefacts.

7. The Data Owner shall adopt a risk-based approach for decisions and investment

relating to Systems managing data for which they are responsible. The Data Owner

is responsible for any residual risk that may not have been mitigated following the

implementation of selected controls.

8. Security controls shall be applied to a Solution as agreed with the Data Owner.

(Refer to Implementation Guidelines below)

9. Groups of services and/or Systems shall be segregated based upon:

• security requirements

• the data’s Security Marking

• risk associated with the respective service and/or System

• cost of segregation

• resulting operational performance constraints

10. Handling of personal data shall comply with the General Data Protection

Regulation1, (EU) 2016/679 and any other applicable legislation or regulation.

Implementation Guidelines

For systems that are hosted on or connect to the Government corporate

infrastructure, the Data Owner shall seek guidance from the Agent‘s Security

Engineering function ([email protected]) regarding security controls

that shall be considered.

Organisation of Information Security

11. The Data Owner shall identify and allocate responsibilities for the protection of data

and for carrying out specific Information Security processes.

12. The Data Owner shall ensure that conflicting duties and areas of responsibility shall

be segregated to reduce risk of unauthorised or unintentional modification or

misuse of Government data.

13. The Project Manager shall ensure that Information Security principles are part of all

phases of a project.

1 https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1571925658226&uri=CELEX:32016R0679

Page 4: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 4 of 22

14. Appropriate contacts with relevant security-related external authorities and special

interest groups shall be established and maintained.

Security Marking of Data2

15. Handling of classified information is regulated by the Manual of Procedures for the

Handling of Classified Information in the Malta Public Service.

16. The Data Owner shall assign a security marking to data for which they are

responsible.

17. In the absence of the assignment of a security marking, the data shall be treated

as Unclassified up to 2 years after the effective date of this policy document,

whereupon, if still not assigned a security marking, the data shall be treated as

Restricted.

18. The Data Owner shall ensure that any ICT Solution or ICT device used to capture,

access, process, store or exchange data that has a continuing value to

Government is secured from unauthorised access, modification or creation of data

through the application of Security Controls commensurate with the Security

Marking of such data.

19. Where possible, different parts of a System shall be assigned a security marking in a

granular manner, according to the security marking of the data that each part

captures, transmits, stores or processes. A System shall be marked based on highest

security marking of data that it shall capture, transmit, store or process.

20. Any data and/or software residing on ICT devices and/or media that the Data

Owner shall no longer be responsible for, shall be securely removed using a method

commensurate with its security marking.

Physical and Environmental Security

21. Storage, exchange, archival and removal of data shall be commensurate with the

data’s security marking.

(Refer to Implementation Guidelines below: a)

22. ICT devices and/or media shall be disposed of using methods commensurate with

their security marking and in accordance with relevant legislation3.

(Refer to Implementation Guidelines below: b)

23. Electronic and physical security controls shall be implemented at the appropriate

levels (not necessarily at all available levels), depending on the classification of the

data being protected. Individuals shall be allowed access to the data depending

on their need to know and security clearance.

24. Individuals or organisations entrusted with the possession and/or use of Government

data shall ensure that the relevant physical controls are in place to prevent:

• Unauthorised access to the data

• Loss of confidentiality, integrity and availability of the data.

25. Where technically possible and not disruptive to the business, security controls of a

workstation or mobile device shall be activated.

(Refer to Implementation Guidelines below: c, d)

2 Refer to Appendix 1. 3 L.N. 63 of 2007 Environment Protection Act (CAP. 435) – Waste Management (Electrical and Electronic

Equipment) Regulations, 2007

Page 5: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 5 of 22

26. When an ICT device having the potential to access Government data has been

lost or stolen, its user shall immediately inform the Data Owner.

(Refer to Implementation Guidelines below: e)

27. Classified data shall be safeguarded from unauthorised access even when left

unattended:

• Desks and other work areas shall be kept clear of data with a security marking

of Restricted or higher when left unattended.

• Screens shall be kept clear of data with a security marking of Restricted or

higher when open for public view or left unattended.

• Any documents containing data with a security marking of Restricted or higher

shall be removed from printers and fax machines immediately.

Implementation Guidelines

For ICT Devices managed by the Agent:

a. Drive encryption shall be enabled on devices subjected to high travel

requirements and that contain sensitive data.

b. Hard disks shall be subjected to wiping, degaussing or destruction, as

appropriate.

c. Equipment shall be locked, logged off or switched off when left unattended.

d. A device shall be automatically locked using a password-protected screen

saver after 15 minutes of inactivity.

e. When an ICT device having the potential to access Government data has been

lost or stolen, the user shall also immediately inform the Agent.

Asset Management

28. An Asset shall have an identified owner.

29. An Asset shall be utilised under the service parameters through which it was made

available to the user.

30. Upon end of employment, agreement or any other form of engagement, the user

shall transfer all relevant data to a corporately governed and managed repository

and securely erase it from any other form of storage.

31. Any Government identification markings on ICT devices and/or media that the

Data Owner shall no longer be responsible for shall be removed.

Access Control

32. The Data Owner shall determine any screening that may be required for any

individual or organisation that may access Systems and/or data. Security screening

shall be commensurate with the security marking of the data to be accessed.

33. The Data Owner shall authorise the access to be given to an Individual to perform

their duties, or to a System to execute its expected function. This access shall be

granted according to the least privilege principle.

34. A workstation user is not authorised to grant access to resources on a workstation,

other than:

• for the User to avail of services rendered by the Agent, such as remote support

Page 6: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 6 of 22

• in the case of a locally attached device which does not function as a data

store, such as a printer. Such a device shall, however, only be shared with

named Users and named workstations.

35. A locally attached device which functions as a data store, such as a pen drive or

external hard disc, may only be shared if:

• it is used solely for work purposes

• it is scanned by the workstation’s endpoint security software

• Government data stored on the device has security controls that are

commensurate with the data’s classification4.

36. The Data Owner shall ensure that access rights assigned to an individual shall be

reviewed on a regular basis and according to the individual’s need to know. These

access rights shall be revoked immediately upon the expiry or termination of the

relevant employment, contractual agreement or assignment.

(Refer to Implementation Guidelines below: a)

37. The Data Owner shall ensure that the process for granting, changing or revoking

access rights is implemented and maintained.

(Refer to Implementation Guidelines below: b)

38. New Systems (for which a public procurement process or internal development has

not yet commenced upon the date when this document becomes effective) shall

make use of federated authentication mechanisms with trusted identity providers.

Existing systems shall do so within 2 years of the effective date of this policy

document.

39. Access rights may be revoked by the service provider should abnormal behaviour

be identified, and the Data Owner shall be advised accordingly. Any re-

assignment of access rights shall require authorisation from the Data Owner.

(Refer to Implementation Guidelines below: c)

40. A device may be disconnected from the Government Corporate Infrastructure by

the service provider should abnormal behaviour of the device be identified, and

the Data Owner shall be advised accordingly.

(Refer to Implementation Guidelines below: d)

41. An interactive account and associated services shall, where technically feasible,

be disabled and/or deleted after a predetermined period of inactivity, unless

required otherwise by the Data Owner.

(Refer to Implementation Guidelines below: e)

Implementation Guidelines

For Systems managed by the Agent:

a. The review of access rights shall be carried out at least every 6 months.

b. The process for granting, changing or revoking access rights shall be the

Electronic Request for Service (eRFS).

For Systems that are hosted on or connect to the Government Corporate

Infrastructure:

4 Refer to Appendix 1.

Page 7: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 7 of 22

c. Revocation of access rights may be carried out by the Agent. Any re-

assignment of access rights shall require authorisation from the Agent.

d. Disconnection may be carried out by the Agent. Any reconnection of the

device shall require authorisation from the Agent.

e. An interactive account used to authenticate with the Agent’s corporate

authentication service as well as the following associated services and their

contents:

• Mailbox

• Home folder

• OneDrive file-hosting service

• Office 365 subscription

shall be disabled after 120 days of inactivity following the last password change

and deleted after 2 years of inactivity following the last password change.

Account Management

42. An interactive account shall be uniquely named in a manner suitable to enable

individual traceability in security audits.

43. Where technically feasible, a generic interactive account shall not be used.

44. A Personalised (named) interactive account shall only be assigned to the individual

for whom it is intended. It shall not be transferred to any other party.

45. Requests for personalised (named) interactive accounts assigned to a solution

provider or service provider, as well as the resulting accounts created, shall be

clearly indicated as such.

46. A non-interactive account shall be Generic and shall not include or bear any

resemblance to any Individual login Account name.

47. A non-interactive account shall have an identified owner.

48. A non-interactive account shall not be used interactively.

49. An account with elevated privileges shall be utilised only when the use of an

account with lower privileges will not allow a task to be executed.

50. A solution provider or service provider shall be assigned different accounts for each

of their employees or contractors.

51. The access rights of any Account shall only apply to its intended System(s) or

service(s).

52. It is recommended that for privileged interactive accounts:

• two-factor authentication or

• a password stored in an enterprise password vault (preferably using a one-time

password mechanism)

shall be considered.

Page 8: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 8 of 22

Passwords5

53. A password shall:

• be strong, i.e., not null and of adequate length and complexity

• not be easily guessed or deduced, or consist of dictionary words

• never be displayed or divulged

• not be written down or printed

• not be stored or transmitted electronically in an unciphered format

• only be stored using corporately approved password managers.

(Refer to Implementation Guidelines below: a, b, c, d)

54. An individual shall only access and/or make use of a password that he/she is

authorised to use.

55. The Data Owner shall identify those passwords that are important for business

continuity and disaster recovery purposes. These passwords shall be stored on

corporately governed and managed password managers.

56. No default password shall be used.

57. An individual shall, on first use, change a new password that is assigned to him/her.

58. Different passwords shall be used for each different account used by the same

individual.

59. Notification prior to expiry of a password shall be given, except for One-Time

passwords (OTP).

60. A password change shall not require the intervention of a Solution Provider.

61. A password used for non-work-related purposes shall not be used for accounts

accessing Government data.

62. If there is reason to believe that a password has been compromised, the individual

identifying such compromise shall inform the Data Owner for appropriate action to

be taken.

(Refer to Implementation Guidelines below: e)

Implementation Guidelines

For Systems that are hosted on or connect to the Government Corporate

Infrastructure, Passwords shall have the following attributes:

a. Length For interactive accounts with elevated privileges

and non-interactive accounts: minimum of 15

characters.

For all other accounts: minimum of 8 characters.

b. Structure Shall contain at least 3 of the following:

• 1 upper case character

• 1 lower case character

• 1 number

• 1 special character

5 These do not include passwords for accounts in use by citizens when consuming public services.

Page 9: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 9 of 22

c. Lifetime A Password for non-interactive accounts may be

set not to expire as long as the System or service

makes available the facility to change this

password.

Passwords for all other non-interactive accounts

and all interactive accounts shall be changed

every 90 days.

d. Retention of its history When resetting passwords, the new password

shall not be the same as at least the last 2

passwords used.

For Systems that are hosted on or connect to the Government Corporate

Infrastructure:

e. If a password has been compromised, the Agent shall also be informed for

appropriate action to be taken.

Protection of Production Data

63. A Production Server shall only be used for production purposes.

64. The use of production data for testing purposes shall be avoided. Simulated data

providing for testing of all modules/functionalities, including but not limited to data

validation, should be created.

65. Where there is no practical alternative to using production data for testing

purposes, the data shall be sanitised by removing personal references or by

modifying the data to the extent that it is rendered as Unclassified.

In cases, where the use of exact copies of production data is absolutely required for

testing purposes, the applicable environment shall have security controls

commensurate with its security marking.

66. Where production data is to be used outside of the production context,

authorisation shall be sought in writing from the Data Owner concerned (in

consultation with the relevant Data Protection Officer), giving the reasons why

production data is absolutely necessary. Such a request shall specify the terms and

conditions, including the purposes, related to the use of production data. Without

such authorisation, no production data may be used. The Data Owner shall keep

a record of such authorisation for audit trail purposes.

67. The role authorized to use such production data shall ensure that the data is erased,

following its use as authorised by the Data Owner, and shall inform the Data Owner

accordingly in writing. The Data Owner shall keep a record of such communication

for audit trail purposes.

68. Backups of production data are considered to be instances of production data.

Use of backups of production data shall not be allowed outside the period of

authorized use.

69. Movement or disposal of production data shall be commensurate with its security

marking.

Page 10: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 10 of 22

Cryptographic Controls

70. A cryptographic key shall be protected against disclosure, modification, loss and

destruction.

71. Digital Certificates and cryptographic keys used for encryption residing locally on

an ICT device shall be backed up and secured by the Individual responsible for the

ICT device, on a location which is external to the ICT device.

72. The use of a Digital Certificate shall abide by the terms as issued by its respective

Cryptographic service provider.

73. Data in storage, data in use and data in transit shall be protected through the

implementation of secure versions of protocols, commensurate with the data’s

security marking.

Where this cannot be achieved, the Data Owner shall seek other measures

commensurate with the security marking of the data.

Operational Procedures and Responsibilities

74. Operating procedures, to ensure the correct and secure operation of solutions,

shall be documented, maintained and made available to all individuals who need

them.

75. The Solution Provider may be requested to provide a report listing the resources

outside the hosting environment that are being accessed by an ICT solution and

the tools being used for such access.

(Refer to Implementation Guidelines below)

76. Changes to Solutions shall be carried out in a controlled manner. A record of such

changes shall be maintained.

77. System usage shall be regularly monitored and tuned and projections shall be

made of future capacity requirements to ensure the required System performance.

Implementation Guidelines

For Systems that are hosted on or connect to the Government Corporate

Infrastructure, a report listing the resources outside the hosting environment that are

being accessed by an ICT solution and the tools being used for such access may be

requested by the Agent.

Protection from Malware

78. Devices used for interaction with Government data shall, for the duration of such

services, have the relevant security controls (such as, but not limited to, anti-virus

protection) applied.

(Refer to Implementation Guidelines below: a)

79. The Data Owner shall ensure that Security Controls are implemented for a Solution

that is processing Government data to remain free of malware.

80. Removable media containing data that has a continuing value to the Government

shall be scanned using corporately approved end-point security software.

81. It is every individual’s responsibility to ensure that any software is only sourced from

reputable, reliable and trustworthy sources and scanned for malware.

Page 11: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 11 of 22

E-mail and Internet

82. A suspicious e-mail received from a known source should not be opened by the

Account Holder before the Account Holder verifies it with the sender.

83. An e-mail from a suspicious or untrustworthy source shall not be opened. At the

recipient’s discretion, such an e-mail may be forwarded as an attachment to the

Agent’s Security Operations Centre ([email protected]) for further

investigation. The Account Holder shall subsequently delete the e-mail from their

mailbox.

84. E-mail messages that are suspected by the Agent to contain potentially malicious

Content and which may therefore constitute a security threat, may be quarantined

by the Agent for security reasons without prior notice.

85. Spam originating from Public Administration e-mail domains shall be brought to the

attention of the Agent’s Security Operations Centre

([email protected]) for investigation and subsequently deleted

without forwarding to other Account Holders.

86. Individuals downloading software or files onto any device shall check the software

or files for potential malware.

87. Files from unknown or suspicious sources shall never be downloaded on any device

that may connect to a Government network.

88. If an account holder is aware of unintentionally contributing to malware (e.g. by

submitting credentials to a malicious third party), they shall report it to the Agent’s

Security Operations Centre ([email protected]) as soon as possible.

Implementation Guidelines

The Agent shall implement and maintain a standard configuration for endpoint

security controls on all the devices that it manages.

Technical Vulnerability Management

89. Measures shall be implemented to detect and manage technical vulnerabilities in

Systems in order to reduce risk from exploitation of technical vulnerabilities. This shall

include the review of any default “out-of-the-box” configurations.

90. Intelligence circumventing any security and/or application controls shall not be

installed.

Connecting to MAGNET

91. Connection of a trusted network to an untrusted network shall be carried out via

adapters6.

92. The connection of any network to the MAGNET shall be discussed with and shall be

subject to approval or otherwise by the Agent.

6 Adapter: A technical artefact that allows the interaction between two distinct systems, using standard and

secure protocols, specifically:

• DNS

• HTTP(S)

• FTP(S)

• SSH

• RDP

Page 12: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 12 of 22

93. A trusted device or network may be provided with access to relevant principal ICT

services on MAGNET on a need basis.

94. An untrusted device or network may be given access to a relevant controlled

subset of ICT services on MAGNET on an exceptional basis, via adapters and as

agreed with and approved by the Agent.

If alternative protocols are required, these shall be subject to approval by the

Agent.

95. Contractors may only be connected to the MAGNET via a logically segregated

network, based on the contractor’s level of security clearance and in line with their

contractual obligations.

96. The following precautionary measures shall be carried out before connecting any

device to the MAGNET:

• Latest patches and updates must be installed

• Anti-virus software shall be installed and up to date.

• Device shall be free from malware

• The operating system firewall should be enabled.

• Ensure that none of the software categories listed in the Acceptable Use

section are installed.

97. Transmission of data to/from any network connected to the MAGNET shall adopt

mutual authentication of end-points and encryption to the appropriate level in

relation to the classification7 of data being transferred.

Servers

Rationale

It is an ICT Device's use, particularly the type of user interaction, that classifies it as a

server. Whilst in its more common role an ICT device that is normally used as a client

is not typically regarded as a server, when the same is employed for back office

production services and is mostly used in a non-interactive fashion, it simultaneously

adopts the role of a server.

This section does not yet cater for server environments hosted on the cloud.

98. Appropriate facility entry controls shall be used to limit and monitor physical access

to servers.

99. A Server shall not be taken outside of its principal area of activity without prior

authorisation by the respective owners. A Server that is taken outside of its principal

area of activity shall have security controls that are commensurate with its risks of

operating outside such an area of activity.

100. A Server shall be accompanied by a maintenance agreement.

101. Features such as services, protocols, web servers and other functionalities that

are either not required for business operations or which may pose a security risk shall

be disabled or reconfigured so as to minimize the associated risk.

102. A Server shall have the relevant security controls enabled and updated at all

times.

7 Classification in accordance with the guidelines set out in the Cabinet Office’s Manual of Procedures for

the Handling of Classified Information in the Malta Public Service.

Page 13: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 13 of 22

103. Inactive sessions shall be shut down after a defined period of inactivity.

104. It shall be ensured that, prior to server and/or server media disposal, any

sensitive data and software has been securely removed, using a method

commensurate with its security classification.

105. Inbound traffic towards servers shall be restricted to the ports required for the

server to carry out its intended function/s in accordance with defined business

requirements.

106. Inbound traffic towards servers shall only be allowed from those sources that

either require access to the services offered by applications or services hosted on

the server or are used by individuals authorised to carry out privileged tasks on the

server.

107. Access to the Internet from servers shall not be allowed unless required for the

server’s intended operation, in which case approval is required by the Data Owner.

Patch management solutions should be considered to avoid direct connectivity to

the internet as much as possible.

108. Non-console administrative access shall be encrypted.

109. For servers handling data classified as Restricted or above, outbound traffic

shall be limited to:

• responses to incoming connections to the server

• connections required in support of the services offered by the server

• outgoing connections required for the continued proper functioning of the

server

110. Configuration standards for server operating system hardening shall be

documented.

Backup

111. All production data shall be backed up according to an established backup

schedule.

The backup schedule shall reflect the:

• Business requirements

• Security requirements and classification

• Business continuity requirements

• Technical and financial considerations

Any other requirements need to be brought to the attention of the service/solution

provider by the Data Owner.

112. It is every individual’s responsibility to ensure that all data that has a continuing

value to the Government is backed up on corporately governed and managed

repositories. Keys for encrypted data shall be made available to authorised

personnel as and when required to ensure business continuity.

113. The Data Owner shall ensure the integrity and availability of backups for data

for which they are responsible. The Agent shall perform backups and restores as

requested by the Data Owner. The integrity and availability of backups shall be

ensured for their lifetime.

114. Backups of production data shall be subject to the same security controls as

the production data.

Page 14: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 14 of 22

115. The storage of Government data, carrying a security marking of Restricted or

above, on removable storage devices may only be considered if such data is

secured commensurate with its security marking.

116. Non-work-related data shall not be stored on corporately governed and

managed repositories.

Clock Synchronisation

117. The clocks for all relevant information processing systems within a Government

organisation shall be synchronised to a reference time source in the following order

of precedence:

• Through the locally competent authority for such a service

• Through a European Union (EU) competent authority for such a service

• Through any open access time source as listed on the NIST Internet Time Service

(ITS).

Audit Data

118. Wherever audit data identified by the Data Owner is being generated, this shall

be accessed and/or disclosed, unaltered and in native format as authorised by the

Data Owner or as requested by competent authorities for investigation purposes as

established by law.

119. As a minimum, audit data records shall include:

• Timestamp

• Source, Context and/or Identity

• Operation

• Outcome

120. Audit data shall not be tampered with or be subject to unauthorised reading.

121. Access to and disclosure of audit data shall only be authorised by the Data

Owner.

122. Audit logging facilities may only be deactivated if authorised by the Data

Owner.

123. Audit data shall have the same security marking as that of the data being

processed by the Solution. As a minimum, be assigned a Security Marking of

Unclassified.

124. Backups of audit data are considered to be instances of audit data.

Government organisations shall determine the retention period for audit data

applicable from the instant at which the data is generated by the original source.

Following this period, the audit data shall be considered as expired and shall be

overwritten, destroyed or deleted. If requested otherwise in writing during this

retention period by the Data Owner or by the competent authorities for

investigation purposes as established by law, the data shall be retained for the

period requested.

(Refer to Implementation Guidelines below: a)

Implementation Guidelines

For audit data that is managed by the Agent, this retention period shall be of 6

months.

Page 15: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 15 of 22

System Acquisition, Development and Maintenance

125. A System shall carry out validation checks upon data input, output and

processing.

126. Implemented security controls shall be commensurate with the highest level of

security marking of the data processed by a system.

127. Rules for the development of systems shall be established and applied.

Information Security incident management

128. Information security events, information security incidents and security

weaknesses impacting Government data shall be reported to the Data Owner.

(Refer to Implementation Guidelines below: a)

129. Upon becoming aware of any information security event, information security

incident and/or security weakness related to an ICT solution managed by a Solution

Provider, the Solution Provider shall immediately take all necessary steps to assess,

contain and rectify it, as agreed with the Data Owner.

(Refer to Implementation Guidelines below: b)

Implementation Guidelines

For Systems that are hosted on or connect to the Government Corporate

Infrastructure:

a. These shall also be reported to the Agent’s Security Operations Centre

([email protected])

b. The Agent may require particular steps to be taken.

Business Continuity Management

130. The Data Owner, assisted by the Service/Solution provider, shall plan,

implement, test and review business continuity arrangements related to any critical

activities supporting the delivery of Government ICT services. Solutions shall be

implemented with redundancy sufficient to reflect availability requirements.

131. Where possible, generic e-mail accounts shall be used instead of personalised

(named) accounts, for business continuity purposes.

Information Security Reviews

132. The approach to managing information security and its implementation shall

be reviewed independently at planned intervals or when significant changes

occur.

133. Security assessments shall be carried out in order to assess any related risks.

(Refer to Implementation Guidelines below)

Implementation Guidelines

For Systems that are hosted on or connect to the Government Corporate

Infrastructure, security assessments shall be carried out by the Agent’s Security

Engineering function ([email protected]) and/or Security

Governance function ([email protected]).

Page 16: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 16 of 22

Intellectual Property Rights

134. Any artefact created:

• as a result of employment or contractual obligations with a Government

organisation, or

• following instructions in writing by a Government organisation

shall be owned by the Government organisation, unless agreed otherwise in writing

by the Government organisation and the author of the work.

135. The author of the intellectual property shall seek authorisation in writing from the

Government organisation for its use, giving detailed reasons for such a request. It

shall be the sole discretion of the Government organisation to accept or refuse the

request.

136. Authors of Intellectual Property that constitutes research data shall, however,

have a non-exclusive license to use such data for educational, research and

scholarly purposes without making profit. Such use shall be limited to the term of

the contractual relationship between the Government organisation and the

author.

137. Third Party Intellectual Property Rights that are licensed to a Government

organisation shall be used in accordance with the applicable license terms and

conditions.

Acceptable Use

138. Installation of software that is specifically required by the business (line of

business software) and was not originally installed on the workstation shall require

the authorisation of the respective CIO.

139. Different versions of a software product, as well as software products that are

bundled inside the same download package, may introduce their own specific

security vulnerabilities. Therefore, they are to be considered as separate software

products and require separate authorisation.

140. All software installed on an ICT device shall be patched with the latest updates,

in line with a documented patch management procedure. Line of business

software shall be patched by the user of the workstation upon which this software

is installed.

141. The following software categories are not allowed on any device that connects

to the MAGNET:

• Packet sniffers

• Password/key cracking software

• Port/vulnerability scanners

• Hacking tools

• Packet crafting tools

• Key loggers

• Key generators

• Credit Card number generators

These software types may only be used for investigation purposes by

bodies/personnel authorised by the Agent.

Page 17: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 17 of 22

The following are not allowed for corporately governed and managed devices

(unless approved by the Agent), but allowed for other devices (such as those used

by suppliers/contractors):

• E-mail clients

• VPN clients

• Tethering software

• Proxies

• DNSs

Page 18: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 18 of 22

Appendix 1: Security Marking List8

Security Marking Description9 Preparation and

handling

Access Copying and

Storage

Exchange Archive or

disposal

Top Secret Data, information and

material the

unauthorised

disclosure of which

could cause

exceptionally grave

prejudice to the

essential interests of

Malta, the EU, NATO or

one or more of their

Member States. Applicable procedures by the appropriate authority10.

Secret Data, information and

material the

unauthorised

disclosure of which

could seriously harm

the essential interests

of Malta, the EU/NATO

or one or more of their

Member States.

Confidential Data, information and

material the

unauthorised

disclosure of which

could be detrimental

to the essential

interests of Malta, the

EU, NATO or one or

Clear Security

Marking and date are

required.

Data shall be

encrypted.

On a right to know

and need to know

basis.

Only named

individuals/roles shall

have access to the

data.

On a right to know

and need to know

basis.

Data shall be

encrypted.

On a right to know

and need to know

basis.

Data shall be

encrypted.

In line with the

requirements of the

National Archives Act

CAP 477.

Method: Purging.

8 Does not apply to physical representations of Government data. 9 Security Marking descriptions are the same as those in the Manual of Procedures for the Handling of Classified Information in the Malta Public Service. 10 Manual of Procedures for the Handling of Classified Information in the Malta Public Service

Page 19: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 19 of 22

Security Marking Description9 Preparation and

handling

Access Copying and

Storage

Exchange Archive or

disposal

more of their Member

States.

It includes:

- Data for which

there is a

legislative,

contractual or

regulatory

obligation on

Government or

its employees to

protect it

- Data which, if

subject to

unauthorised

disclosure,

modification or

destruction,

could give rise to

a security

breach; such a

security breach

could happen

with minimal

effort due to lack

of adequate

compensating

controls in place.

Examples of the

significant impact

which may result if

confidential data is

not protected

include:

Security marking shall

be made evident,

without the need to

decrypt the data.

If data is accessed

from an ICT device

not owned by the

data’s intended

recipient, the data

shall be removed.

Explicit authorisation

shall be required for

data to be

exchanged both

within and outside of

the Enterprise context.

Should the data

originate outside of

the Enterprise context,

authorisation shall be

required for its

exchange within the

Enterprise context.

Transmission of

encrypted data and

its related encryption

key shall be

conducted through

separate transmission

channels.

Page 20: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 20 of 22

Security Marking Description9 Preparation and

handling

Access Copying and

Storage

Exchange Archive or

disposal

- Breach of law

- Financial impact

- Security

breach/incident

Restricted Data, information and

material the

unauthorised

disclosure of which

could be

disadvantageous to

the interests of Malta,

the EU, NATO or one

or more of its Member

States.

Data that is restricted

requires named

individuals/roles to

have access to it. The

disclosure of such

data may result in

undesirable

consequences such

as:

- Unfair advantage

to unauthorised

recipients

- Damage to the

reputation of

Government

Offline email data files

shall, as a minimum,

be assigned this

marking.

Clear Security

Marking and date are

required.

Encryption is

recommended.

On a right to know

and need to know

basis.

Only named

individuals/roles shall

have access to it.

On a right to know

and need to know

basis.

Encryption is

recommended.

Data that is persisted

on portable media or

mobile devices shall

be encrypted or

password-protected

as a minimum.

On a right to know

and need to know

basis.

Encryption is

recommended.

In line with the

requirements of the

National Archives Act

CAP 477.

Method: Purging.

Page 21: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 21 of 22

Security Marking Description9 Preparation and

handling

Access Copying and

Storage

Exchange Archive or

disposal

Unclassified Data that does not

fall under any of the

above security

markings.

Clear Security

Marking and date are

recommended.

On a right to know

and need to know

basis.

On a right to know

and need to know

basis.

On a right to know

and need to know

basis.

In line with the

requirements of the

National Archives Act

CAP 477.

Method: Erasure.

Page 22: GMICT Policy ictpolicies.gov

GMICT P 0016 Information Security Policy v6.0 ictpolicies.gov.mt

Security marking: Unclassified

Page 22 of 22

Deviations from GMICT Policy

Instances where it may not be technically possible or cost-effective to comply with a

particular GMICT Policy requirement shall be reported as risks at https://rrs.gov.mt to be

assessed.

Breaches of GMICT Policy shall be brought to the attention of the respective CIO office

in order to determine appropriate corrective action and potential control

improvements involving relevant stakeholders, as appropriate.

Issuing Authority

This document has been issued by the Malta Information Technology Agency.

Contact Information

Government ICT Policies may be found at https://ictpolicies.gov.mt.

Any suggestions, queries or requests for clarification regarding Government ICT Policies

may be forwarded to [email protected].